Create WordPress Plugin Fun Hahaha

Frequently Asked Questions

How long will the review process take?

This is in the Developer FAQ. It takes anywhere between 1 and 10 days. We attempt to review all plugins within 5 business days of submission, but the process takes as long as it takes, depending on the complexity of your plugin.

WordPress plugins are like magical enhancements for your website. They can turn a basic site into a feature-rich powerhouse. But let’s be honest: sometimes the process of creating one can feel more like a grueling task than a fun adventure. Fear not! In this article, we’re going to inject some humor into the process and turn plugin development into a playful experience.

Step 1: The Idea – Fun Starts Here!

First things first: you need an idea for your plugin. It could be anything from a quirky feature to a tool that solves a peculiar problem. Remember, the more fun the idea, the more fun the development will be!

Example: How about a plugin that adds a “Punny Comment of the Day” widget to your site? Imagine visitors chuckling at puns every time they check your blog!

Step 2: Setting Up Your Plugin – The Easy Part

Let’s get started by setting up your plugin’s basic structure. Don’t worry; it’s easier than it sounds.

  1. Create a Plugin Folder: Go to your WordPress installation directory, navigate to wp-content/plugins/, and create a new folder for your plugin. Name it something fun, like punny-comment-widget.
  2. Create the Main Plugin File: Inside your plugin folder, create a file named punny-comment-widget.php. This will be the main file for your plugin.
  3. Add Plugin Header Information: Open punny-comment-widget.php and add the following code at the top:

Step 3: Writing the Code – Let’s Have Some Fun!

Here’s where the magic happens. We’ll create a simple widget that displays a random pun each day.

  1. Register the Widget

Step 4: Testing Your Plugin – Time for Some Giggles

Activate your plugin from the WordPress admin panel (Plugins > Installed Plugins) and then add the widget to your sidebar (Appearance > Widgets). You should see your “Punny Comment Widget” in action. Refresh your site and enjoy the chuckles!

Step 5: Debugging and Refining – Keep the Fun Alive

While your plugin might work perfectly on the first try, don’t be surprised if you encounter some bugs. The key is to approach debugging with a sense of humor. Remember, even the best coders make mistakes.

  1. Check Error Logs: WordPress will often log errors to wp-content/debug.log if you have debugging enabled.
  2. Ask for Help: Don’t be afraid to reach out to the WordPress community for support.

Step 6: Share and Enjoy – Spread the Laughter

Once you’re satisfied with your plugin, share it with the world. You can even create a fun promo video showcasing your plugin’s features. The more you share, the more people will enjoy your playful addition to the WordPress ecosystem.

Conclusion

Creating a WordPress plugin doesn’t have to be a dry, technical task. With a pinch of creativity and a dash of humor, you can turn plugin development into a fun and rewarding experience. So, grab your favorite pun and get coding!

Happy plugin-ing, and remember: in the world of WordPress, there’s always room for a good laugh!

Google Cloud Skills Boost

TitleEarnedCertification
Detect, Respond, and Recover from Cloud Cybersecurity AttacksJun 14, 2024 EDTCertification Link
Put It All Together: Prepare for a Cloud Security Analyst JobJun 10, 2024 EDTCertification Link
Cloud Security Risks: Identify and Protect Against ThreatsMay 28, 2024 EDTCertficiation Link
Strategies for Cloud Security Risk ManagementMay 28, 2024 EDTCertification Link
Introduction to Security Principles in Cloud ComputingMay 27, 2024 EDTCertification Link
Introduction to Responsible AIMay 26, 2024 EDTCertification Link
Introduction to Large Language ModelsMay 25, 2024 EDTCertification Link
Prompt Design in Vertex AIMay 25, 2024 EDTCertification Link
Responsible AI: Applying AI Principles with Google Cloud May 26, 2024 EDTCertification Link
Introduction to Generative AIMay 24, 2024 EDTCertification Link
Derive Insights from BigQuery DataOct 23, 2022 EDTCertification Link

Detect, Respond, and Recover from Cloud Cybersecurity Attacks

This is the fourth of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll focus on developing capabilities in logging, security, and alert monitoring, along with techniques for mitigating attacks. You’ll gain valuable knowledge in customizing threat feeds, managing incidents, handling crisis communications, conducting root cause analysis, and mastering incident response and post-event communications. Using Google Cloud tools, you’ll learn to identify indicators of compromise and prepare for business continuity and disaster recovery. Alongside these technical skills, you’ll continue updating your resume and practicing interview techniques.

Put It All Together: Prepare for a Cloud Security Analyst Job

This is the fifth of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll combine and apply key concepts such as cloud security principles, risk management, identifying vulnerabilities, incident management, and crisis communications in an interactive capstone project. Additionally, you’ll finalize your resume updates and put to practice all the new interview techniques you’ve learned, preparing you to confidently apply for and interview for jobs in the field.

Cloud Security Risks: Identify and Protect Against Threats

This is the third of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll explore the principles of identity management and access control within a cloud environment, covering key elements like AAA (Authentication, Authorization, and Auditing), credential handling, and certificate management. You’ll also explore essential topics in threat and vulnerability management, cloud-native principles, and data protection measures. Upon completing this course, you will have acquired the skills and knowledge necessary to secure cloud-based resources and safeguard sensitive organizational information. Additionally, you’ll continue to engage with career resources and hone your interview techniques, preparing you for the next step in your professional journey.

Strategies for Cloud Security Risk Management

This is the second of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll explore widely-used cloud risk management frameworks, exploring security domains, compliance lifecycles, and industry standards such as HIPAA, NIST CSF, and SOC. You’ll develop skills in risk identification, implementation of security controls, compliance evaluation, and data protection management. Additionally, you’ll gain hands-on experience with Google Cloud and multi-cloud tools specific to risk and compliance. This course also incorporates job application and interview preparation techniques, offering a comprehensive foundation to understand and effectively navigate the complex landscape of cloud risk management.

Introduction to Security Principles in Cloud Computing

This is the first of five courses in the Google Cloud Cybersecurity Certificate. In this course, you’ll explore the essentials of cybersecurity, including the security lifecycle, digital transformation, and key cloud computing concepts. You’ll identify common tools used by entry-level cloud security analysts to automate tasks.

Introduction to Responsible AI

This is an introductory-level microlearning course aimed at explaining what responsible AI is, why it’s important, and how Google implements responsible AI in their products. It also introduces Google’s 7 AI principles.

Responsible AI: Applying AI Principles with Google Cloud

This course, Responsible AI: Applying AI Principles with Google Cloud – Locales, is intended for non-English learners. If you want to take this course in English, please enroll in Responsible AI: Applying AI Principles with Google Cloud. As the use of enterprise Artificial Intelligence and Machine Learning continues to grow, so too does the importance of building it responsibly. A challenge for many is that talking about responsible AI can be easier than putting it into practice. If you’re interested in learning how to operationalize responsible AI in your organization, this course is for you. In this course, you will learn how Google Cloud does this today, together with best practices and lessons learned, to serve as a framework for you to build your own responsible AI approach.

Prompt Design in Vertex AI

Complete the introductory Prompt Design in Vertex AI skill badge to demonstrate skills in the following: prompt engineering, image analysis, and multimodal generative techniques, within Vertex AI. Discover how to craft effective prompts, guide generative AI output, and apply Gemini models to real-world marketing scenarios. A skill badge is an exclusive digital badge issued by Google Cloud in recognition of your proficiency with Google Cloud products and services and tests your ability to apply your knowledge in an interactive hands-on environment. Complete this skill badge course and the final assessment challenge lab to receive a skill badge that you can share with your network.

Introduction to Large Language Models

This is an introductory level micro-learning course that explores what large language models (LLM) are, the use cases where they can be utilized, and how you can use prompt tuning to enhance LLM performance. It also covers Google tools to help you develop your own Gen AI apps.

Introduction to Generative AI

This is an introductory level microlearning course aimed at explaining what Generative AI is, how it is used, and how it differs from traditional machine learning methods. It also covers Google Tools to help you develop your own Gen AI apps.

Derive Insights from BigQuery Data

Complete the introductory Derive Insights from BigQuery Data skill badge to demonstrate skills in the following: write SQL queries, query public tables, load sample data into BigQuery, troubleshoot common syntax errors with the query validator in BigQuery, and create reports in Looker Studio by connecting to BigQuery data. A skill badge is an exclusive digital badge issued by Google Cloud in recognition of your proficiency with Google Cloud products and services and tests your ability to apply your knowledge in an interactive hands-on environment. Complete this skill badge course, and the final assessment challenge lab, to receive a skill badge that you can share with your network.

Referrence: https://www.cloudskillsboost.google/profile/badges

Quiet Quitting

Quiet Quitting is the commonly discussed buzzword today with the HR Fraternity. A lot has been spoken about the Great Resignation however that is a very myopic approach to managing Talent. Silent Resignation or Quiet Quitting as it is called in recent times much precedes before the any employee makes the final decision to resign.

Like the Pandemic, this phenomenon also finds its origin to China and the trend was referred to as “tang ping” 躺平 or “lying flat”. This is nothing but a slow protest where employees refuse to overwork or succumb to pressure.

The causes of this behavior include employees feeling that their work is not getting enough appreciation or recognition from the company, both material and non-material, or because the workload is too high, causing employees to feel exhausted to the point of burnout. Blurred boundaries between work and personal life can also be a driving factor for this behavior, because someone is often still busy with work matters outside of working hours or even during holidays. Often here it means when something like this happens repeatedly, not only because of an emergency.

In order for this employee behavior to be anticipated quickly and accurately by the organization, it is necessary for the organization to recognize early on the occurrence of this behavior in its employees. Some of the characteristics of employees who are starting to engage in quiet quitting behavior include:

  • Not willing to do work outside of their main job.
  • Going home from work on time and avoiding overtime.
  • Working according to their portion.
  • Not wanting to deal with work or answer questions about work obligations during holidays.
  • Losing interest in becoming an outstanding employee in the company.
  • Passive during meetings or certain discussions related to work.
  • Rarely attending events organized by the company.

The debate in this case is that not everyone agrees with the phenomenon of quiet quitting, including according to workplace politeness expert, Pattie Ehsai, stating that you will not succeed in the workplace with such behavior. However, seen from another perspective, this phenomenon cannot be said to be completely wrong because it will actually create clearer boundaries between work life and personal life and more broadly, can realize work life balance. But it cannot be denied that this behavior also has the risk of harming the organization。

Having observed the trend of resignations with a few organizations and some insightful discussions with peers; I have identified classic behavioral patterns in this Quiet Quitting phenomenon. Employees go through 3 classic phases of transition before the ultimate plunge of Resigning. The three stages are as below:

1. Emotional Stage of Quitting: All humans are emotional beings and employees who feel that their expertise and experience is no more valued in workplace often give in to emotional low. At this stage the employee is confused as to what is happening with them and are not able to arrive at conclusive understanding on what to do next. There is an internal conflict between wanting to stay and deciding to move on.

    2. Mental Stage of Quitting: Disengagement on a chronic basis indicates that employee is evaluating his / her sustenance at work place. Employees continue to remain active contributors of their work but are mentally no longer committed to the hustle culture. There is a conscious effort to avoid work stress. Employees have internalized the fact that they are no longer enjoying their engagement with the current organization.

    3. Physiological Stage of Quitting: This is the most visible of all stages; where employees openly expressing their discomfort and willingness to move on. Employees no more want to shy away from accepting that they are actively exploring options outside of workplace. A very cliché yet commonly used phrase by employees at this phase; ‘itna paise mein itnaich milega”

    Ahref Backlink Checker Periodically

    Ahref Free Tools check Domain Rating https://ahrefs.com/backlink-checker

    Ahref Free Tools

    https://josuamarcelc.com | 20 Maret 2021

    https://josuamarcelc.com | 18 July 2022

    https://josuamarcelc.com | 28 October 2022


    https://josuamarcelc.com | 30 November 2022

    https://josuamarcelc.com | 27 Feb 2023

    https://josuamarcelc.com | 25 April 2023

    https://josuamarcelc.com | 22 Feb 2023

    https://josuamarcelc.com | 25 June 2024

    Top Crawlers Bots IP Ranges For Search Engine Optimization

    In the world of Search Engine Optimization (SEO), understanding the behavior of search engine crawlers is crucial. These crawlers, also known as bots or spiders, are automated programs used by search engines like Google, Bing, and others to scan and index the content of websites. By identifying the IP ranges of these crawlers, webmasters can optimize their websites more effectively. This article delves into the top crawlers, their IP ranges, and how this knowledge benefits SEO.

    ENGINEENDPOINT
    Google IP Rangeshttps://www.gstatic.com/ipranges/goog.json
    Google Botshttps://developers.google.com/static/search/apis/ipranges/googlebot.json
    Google Special Crawlershttps://developers.google.com/static/search/apis/ipranges/special-crawlers.json
    Google User Triggeredhttps://developers.google.com/static/search/apis/ipranges/user-triggered-fetchers.json
    Global and regional external IP address ranges for customers’ Google Cloud resourceshttps://www.gstatic.com/ipranges/cloud.json
    BingBot IP Rangeshttps://www.bing.com/toolbox/bingbot.json
    DuckDuckGo Botshttps://duckduckgo.com/duckduckgo-help-pages/results/duckduckbot/
    Ahref Crawler IP Rangeshttps://api.ahrefs.com/v3/public/crawler-ip-ranges
    Yandex IP Rangeshttps://yandex.com/ips
    Facebook IP Rangeshttps://developers.facebook.com/docs/sharing/webmasters/crawler/

    ReferencesLink
    All Crawlers User Agentshttps://gist.github.com/josuamarcelc/6bfbdc14c6292e195844032bea7211d1
    Google Crawler Indexinghttps://developers.google.com/search/docs/crawling-indexing/verifying-googlebot
    Yandex Robotshttps://yandex.com/support/webmaster/robot-workings/check-yandex-robots.html
    Moz RogerBothttps://moz.com/help/moz-procedures/crawlers/rogerbot
    Verify Bingbothttps://www.bing.com/webmasters/help/verify-bingbot-2195837f

    Cloud IPsReference Link
    IP Ranges v4https://www.cloudflare.com/ips-v4/#
    IP Ranges V6https://www.cloudflare.com/ips-v6/#
    API IP Rangeshttps://api.cloudflare.com/client/v4/ips
    Yandex Cloud IPshttps://cloud.yandex.com/en/docs/vpc/concepts/ips

    Understanding Search Engine Crawlers

    What Are Crawlers?

    Crawlers are automated programs that visit websites to read and index their content. They follow links from one page to another, thereby creating a map of the web that search engines use to provide relevant search results.

    Importance in SEO

    Recognizing crawlers is essential in SEO as it ensures that your website is indexed correctly. Proper indexing increases the chances of your website appearing in search results, thereby driving organic traffic.

    Top Search Engine Crawlers and Their IP Ranges

    Googlebot

    • Primary Role: Indexing websites for Google Search.
    • IP Range: Googlebot IPs typically fall within the range owned by Google. However, due to the vast number of IP addresses Google owns, it’s more efficient to verify Googlebot by using the reverse DNS lookup method.

    Bingbot

    • Primary Role: Crawling for Microsoft’s Bing search engine.
    • IP Range: Bingbot also uses a range of IP addresses. Similar to Googlebot, it’s advisable to use reverse DNS lookups to confirm the legitimacy of Bingbot.

    Baiduspider

    • Primary Role: Indexing for the Baidu search engine, predominantly used in China.
    • IP Range: Baiduspider’s IP ranges are published by Baidu and can be found in their webmaster tools documentation.

    Yandex Bot

    • Primary Role: Crawling for Russia’s Yandex search engine.
    • IP Range: Yandex provides a list of IP addresses for its crawlers, which can be found in their official documentation.

    Why Knowing IP Ranges Matters

    1. Security: Distinguishing between legitimate crawlers and malicious bots is crucial for website security.
    2. Accurate Analytics: Identifying crawler traffic helps in obtaining more accurate analytics data, as it separates human traffic from bot traffic.
    3. SEO Optimization: Understanding crawler behavior helps in optimizing websites for better indexing and ranking.
    4. Resource Management: It helps in managing server resources effectively, as crawlers can consume significant bandwidth.

    Best Practices for Managing Crawler Traffic

    • Robots.txt File: Use this to guide crawlers on which parts of your site to scan and which to ignore.
    • Monitoring Server Logs: Regularly check server logs for crawler activities to ensure that your site is being indexed properly.
    • Updating Sitemaps: Keep your sitemaps updated to aid crawlers in efficient website navigation.

    Conclusion

    Recognizing and understanding the IP ranges of top search engine crawlers is a vital aspect of SEO. It helps in distinguishing between genuine search engine bots and potential security threats, enhances website performance, and contributes to more effective SEO strategies. As search engines evolve, staying informed about crawler activities and best practices is essential for maintaining and improving your website’s search engine visibility.

    LLC vs. S Corp vs. C Corp vs Nonprofit Corp

    There are generally four types of corporations that are commonly used for incorporation:

    • C Corporation
    • S Corporation
    • Nonprofit Corporation
    • Professional Corporation

    To compare top-level attributes for each type of corporation and compare them to other business structures, please visit our Business Structures Chart.

    Limited liability company (LLC)

    A limited liability company is a business entity that offers some separation of the people owning the business from the business itself. An LLC protects its owners (known as “members”) from being financially liable for most debts and damages and protects their personal assets in the event a business fails.

    Forming an LLC requires that the business owner(s) file articles of incorporation. These articles outline the structure of the business. This is where LLCs rise above the other business entity types available to US small businesspeople—an LLC can opt for many different operating models: a 50/50 partnership, or even maintain a board of directors, like a C corporation.

    The main advantage to forming and operating as an LLC lies in its simplicity. Income is taxed at the personal level one time, as opposed to at the corporate level, or both the corporate and personal levels (“double taxation”). LLCs can also choose what tax treatment works best for them—they can opt for pass-through taxation, like an S corp, or double taxation, like a C corp.

    See our state specific guides for California LLCTexas LLC and Florida LLC.

    C Corporation

    • C Corporation is also known as a general for-profit corporation.
    • The C Corporation is the most common form of corporate entity.
    • The C Corporation is formed by filing an Articles of Incorporation with the state office.
    • The C Corporation is owned by shareholders and there is no limit on the number of shareholders in a C Corporation.
    • The shareholders elect a Board of Directors to create and direct the high-level policies of the business. This Board of Directors then appoints corporate officers who in turn manage the day-to-day operations of the business.
    • Shareholders generally have limited liability, even if they are involved in the day-to-day management while wearing the hat of an employee or a corporate officer.
    • The shares of a corporation are freely transferable unless limited by the agreement of the shareholders.
    • The corporation exists indefinitely, unless and until it is dissolved.
    • It is a separately taxable entity, meaning that it must file its own tax return and pay corporate taxes on its profits.

    S Corporation

    An S Corporation is formed in the same way that a C Corporation. However, the S Corporation is different from a C Corporation in two significant ways:

    • The S Corporation makes an election to be taxed as a pass-through entity under subchapter S of the Internal Revenue Code. This means that an S Corporation is not taxed separately and apart from its owners and/or shareholders. Instead, corporate profits and losses are passed-through and reported on the personal income tax returns of the shareholders, much like a partnership.
    • In contrast to a C Corporation, an S Corporation has limitations on ownership.
    • In an S Corporation:
      • There is a limit of up to 100 shareholders.
      • Each shareholder must be an individual or a trust (not another corporation)
      • Each individual shareholder must be a citizen of the United States or a “Resident Alien” which includes Permanent Residents (a person who has been issued a Green Card) and certain Aliens who pass the Substantial Presence Test. These residents (who pass the Substantial Presence Test) need not be permanent residents. They can be Visa holders (H1/L1) and still be considered Resident Alien per tax laws.

    Nonprofit Corporation

    For those groups that are formed for charitable, educational, religious, literary, or scientific purposes, and not for the purpose of generating profits for its shareholders, a special legal entity may be formed under Section 501(c)(3) of the Internal Revenue Code. A fully and properly qualified 501(c)3 Nonprofit Corporation has the following characteristics:

    • The corporation is exempt from taxation.
    • Tax-exempt corporations are prohibited from paying dividends.
    • Upon dissolution, corporate assets must generally be distributed to another qualified nonprofit group.
    • Significant filing requirements may exist at both the State and Federal level to establish and maintain tax-exempt status.
    • A nonprofit corporation may be prohibited from engaging in certain activities, including participating in political campaigns and substantial engagement in lobbying activities.

    Professional Corporation

    • Professional Corporation is used by businesses that provide a professional service. Examples include:
      • Physicians or Doctors
      • Attorneys or Law Firms
      • Accounting Professionals or CPAs
      • Architects
      • And other licensed professionals
    • Most states have special filing requirements when incorporating.
    • A Professional Corporation can shield a professional service provider (doctors, attorneys, accountants, etc.) from liability for the operations of the business.
    • The tax advantages for a Professional Corporation are the same as the advantages afforded to a C Corporation or S Corporation.
    • Corporate filing requirements can vary and may be more or less expansive depending on your state.
    • Laws governing professional services and corporations are often quite complex. We strongly urge you to consult with an attorney before making the decision to incorporate as a professional corporation.

    State of incorporation

    Small business owners in the US may incorporate their company in any of the 50 states. The state in which you incorporate your small business determines a variety of important factors, not just which laws your company is subject to. It will dictate how your business is taxed and even where you can sue or be sued.

    Variables to consider when choosing where to incorporate your small business include:

    • Geographical convenience. Is the state of incorporation easy to get to?
    • Minimum owners. Certain states require a certain number of people to establish a business.
    • Tax structure. How much does the state levy annually in corporate franchise tax? Will income your business earns elsewhere be subject to taxes in the state of incorporation?
    • Records. Some states require that you keep records within state lines.
    • Banking. Some states require that a corporate bank account exist, and oftentimes within the boundaries of the state of incorporation.

    Special requirements for special fields

    Certain fields requiring special certification or licenses—such as medical or legal practice—are limited in terms of what types of business entity practitioners can elect to form. Depending on the state of incorporation, groups of such professionals may have to come together in the form of a professional corporation or professional services corporation.

    Professional services corporations allow licensed professionals to benefit from the liability protections embedded in traditional corporate structures, excluding malpractice claims against licensed practitioners themselves. Professional services corporations are taxed like C corps. They are subject to corporate tax, as well as tax on shareholder distributions.

    In some states, such as California or Virginia, professionals may organize into LLPs or LLCs. The main difference between an LLP/LLC model and a professional services corporation is that the latter must pay income taxes on the corporation itself, like a C corp, whereas with LLPs and LLCs, members pay personal income taxes on income received.

    Occupations covered by these state mandates may include:

    • Lawyers (lawyers are barred from forming LLCs in some states)
    • Accountants
    • Health care professionals
    • Engineers and architects

    Install PHP 8.2.8 In Ubuntu NGINX Server

    PHP 8.2 also includes bug fixes and performance improvements over previous versions like 8.1. We recommend you test your codebase with PHP 8.2 before upgrading in a production setup, just to ensure that everything works as expected.

    In this article we shall cover steps that are used in the installation of PHP 8.2 on Ubuntu 22.04|20.04|18.04. The default version of PHP available on OS repositories is usually older than PHP official latest releases. PPA (Personal Package Archive) software repositories for PHP allows you to install newer releases of PHP on your Ubuntu system that are not available in the official repositories of a Linux distribution.

    sudo apt update
    
    sudo apt install -y lsb-release gnupg2 ca-certificates apt-transport-https software-properties-common
    
    sudo add-apt-repository ppa:ondrej/php
    
    sudo apt install php8.2-cli php8.2-fpm php8.2-common php8.2-mysql php8.2-pgsql php8.2-zip php8.2-gd php8.2-mbstring php8.2-curl php8.2-xml php8.2-bcmath php8.2-memcached
    
    php -v
    

    PHP 8.2.8 (cli) (built: Jul 8 2023 07:10:21) (NTS)
    Copyright (c) The PHP Group
    Zend Engine v4.2.8, Copyright (c) Zend Technologies
    with Zend OPcache v8.2.8, Copyright (c), by Zend Technologies

    [AmpAnalytics ] No triggers were found in the config. No analytics data will be sent.

    
    <script async custom-element="amp-analytics" src="https://cdn.ampproject.org/v0/amp-analytics-0.1.js"></script>
    
    <amp-analytics type="googleanalytics" config="https://amp.analytics-debugger.com/ga4.json" data-credentials="include">
    <script type="application/json">
    {
        "vars": {
                    "GA4_MEASUREMENT_ID": "G-XXXXXXXX",
                    "GA4_ENDPOINT_HOSTNAME": "www.google-analytics.com",
                    "DEFAULT_PAGEVIEW_ENABLED": true,    
                    "GOOGLE_CONSENT_ENABLED": false,
                    "WEBVITALS_TRACKING": false,
                    "PERFORMANCE_TIMING_TRACKING": false,
                    "SEND_DOUBLECLICK_BEACON": false
        }
    }
    </script>
    </amp-analytics> 

    As a small sneak-peak, this is the meaning for all the configuration switches.

    FEATURE NAMEDESCRIPTION
    GA4_MEASUREMENT_IDYour Measurement IDG-XXXXXXXX
    GA4_ENDPOINT_HOSTNAMEOverride the default endpoint domain. In case you want to send the hits to your own server or a Server Side GTM Instance.
    GOOGLE_CONSENT_ENABLED&gcs parameter will be added to the payloads with the current Consent Status
    WEBVITALS_TRACKINGIf you enable this a webvitals event will fire 5 seconds after the page is visible
    PERFORMANCE_TIMING_TRACKINGWhatever you want to push a performance_timing event including the current page load performance timings
    DEFAULT_PAGEVIEW_ENABLEDIf enabled a page_view event will fire on the page load
    SEND_DOUBLECLICK_BEACONSend a DC Hit

    Install PHP 8.2 on Ubuntu with Nginx

    PHP 8.2 is work well with WordPress, i tested already on my site josuamarcelc.com

    josuamarcelc

    ALL IN ONE CODE

    sudo apt update && apt upgrade -y
    sudo add-apt-repository ppa:ondrej/php
    sudo apt update
    sudo apt install php8.2 -y
    sudo apt-get install -y php8.2-cli php8.2-common php8.2-fpm php8.2-mysql php8.2-zip php8.2-gd php8.2-mbstring php8.2-curl php8.2-xml php8.2-bcmath php8.2-pgsql

    1. Run system updates

    The first thing to do in a new system is to update our repositories in order to make them up to date. Run upgrade command also.

    sudo apt update && apt upgrade -y

    2. Add Ondrej sury PPA repository

    To run PHP 8.2 on Ubuntu 22.04, we need to add Ondrej sury PPA into our system. This is the maintainer of the PHP repository at the moment. This PPA is not currently checked so installing from it will not be guaranteed 100% results.

    To add this PPA use the following command on our terminal.

    sudo add-apt-repository ppa:ondrej/php

    After installation is complete we need to update the repositories again for the changes to take effect.

    sudo apt update

    3. Install PHP 8.2 on Ubuntu 22.04

    We should now be able to install PHP 8.2 on Ubuntu 22.04 Linux machine. The commands to run are as shared below:

    sudo apt install php8.2 -y

    Check for the currently active version of PHP with the following command:

    php --version

    4. Install PHP 8.2 Extensions

    Besides PHP itself, you will likely want to install some additional PHP modules. You can use this command to install additional modules, replacing PACKAGE_NAME with the package you wish to install:

    sudo apt-get install php8.2-PACKAGE_NAME

    You can also install more than one package at a time. Here are a few suggestions of the most common modules you will most likely want to install:

    sudo apt-get install -y php8.2-cli php8.2-common php8.2-fpm php8.2-mysql php8.2-zip php8.2-gd php8.2-mbstring php8.2-curl php8.2-xml php8.2-bcmath php8.2-pgsql

    This command will install the following modules:

    • php8.2-cli – command interpreter, useful for testing PHP scripts from a shell or performing general shell scripting tasks
    • php8.2-common – documentation, examples, and common modules for PHP
    • php8.2-mysql – for working with MySQL databases
    • php8.2-zip – for working with compressed files
    • php8.2-gd – for working with images
    • php8.2-mbstring – used to manage non-ASCII strings
    • php8.2-curl – lets you make HTTP requests in PHP
    • php8.2-xml – for working with XML data
    • php8.2-bcmath – used when working with precision floats
    • php8.2-pgsql – for working with PostgreSQL databases

    Best DNS Servers List

    DNSIPv4IPv6
    Google Public DNS8.8.8.8
    8.8.4.4
    2001:4860:4860::8888
    2001:4860:4860::8844
    OpenDNS208.67.222.222
    208.67.220.220
    Quad9 (Malware Blocking Enabled)9.9.9.9
    149.112.112.112
    2620:fe::fe
    2620:fe::9
    DNS.Watch84.200.69.80
    84.200.70.40
    2001:1608:10:25::1c04:b12f
    2001:1608:10:25::9249:d69b
    Comodo Secure DNS8.26.56.26
    8.20.247.20
    Cloudflare1.1.1.1
    1.0.0.1

    What is DNS propagation?

    DNS propagation is the time DNS changes take to be updated across the internet on the globe. It can take up to 72 hours to propagate worldwide. You can check your DNS propagation results from here.

    What is DNS resolution?

    DNS resolution translates the domain name into the site’s IP address. You need a site’s IP address to know where it’s on the internet. A website could have IPv4 or IPv6 addresses or both. Where the IPv4 address comes in the form of an A record and the IPv6 address comes in an AAAA record.

    How do DNS records propagate?

    When you update your DNS records, it may take up to 72 hours for the changes to take effect. During this period, the ISPs worldwide update their DNS cache with new DNS information for your domain.

    However, due to different DNS cache level, after DNS records changes, some of the visitors might be redirected to the old DNS server, for some time, and other can see the website from new DNS server, shortly after the changes. You can perform the A, AAAA, CNAME, and additional DNS records lookup.

    Why DNS propagation takes time?

    Suppose you changed your domain’s nameservers, and you requested to open your domain on the web browser. Your request will not go to the hosting directly.

    Each of the ISP nodes first checks its DNS cache, whether it has the DNS information for that domain. If it is not there, it will look it up to save it for future use to speed up the DNA lookup process.

    Thus, the new nameservers will not propagate instantly – ISPs have different cache refreshing levels, so some will still have the old DNS information in their cache.

    But if after that time interval, still, your new DNS changes are not reflecting, then you go for a DNS health check to ensure that your DNS changes are up to the mark and are following the standards.

    How does the DNS process work?

    Suppose you request to open the URL https://abc.com in your web browser’s bar.

    1. The web browser first checks in its local cache whether it has the requested domain’s IP address. If it’s not present, then it will send the request to the Name Resolving Server.
    2. The Name Resolving Server checks its cache against that request. If it fails to find the requested domain’s IP address, it will send that request to the Root Server.
    3. The Root Server only contains the server’s IP address with TLD (Top Level Domain) related information. It will redirect the Name Resolving Server to the TLD server containing .com information.
    4. The TLD server provides the server’s IP address (authoritative servers for requested URL https://abc.com) to the Name Resolving Server.
    5. The Name Resolving Server caches that information for a specific period (TTL) and passes that information to the requested’s computer.
    6. The client’s computer builds the connection with the authoritative server (containing the requested URL https://abc.com) for the requested content and caches the IP address’s information in its browser for further use.

    Why is DNS not propagating?

    The ISPs across the world have a different caching level. The DNS client or the server may cache the information the DNS records in its DNS cache. That information is temporarily cached, and DNS servers will go for the updated DNS information when TTL (Time to Live) expires.

    What will happen if the domain name does not exist?

    The DNS server will return a name error, also known as an NXDomain response (for non-existent domain), to symbolize that the query’s domain name does not exist.

    What is the port used by DNS?

    DNS uses both TCP and UDP port 53. However, the most frequently used port for DNS is UDP 53. That is used when the client’s computer communicates with the DNS server for resolving the specific domain name. Be sure, when using the UDP 53 for DNS, the maximum size of the query packet is 512 bytes.

    TCP 53 is used primarily for Zone Transfers and when the query packet exceeds 512 bytes. That is true when DNSSEC is used, which adds extra overhead to the DNS query packet.

    What is DNS failure?

    DNS failure means that the DNS server cannot convert the domain name into an IP address in a TCP/IP network. That failure may occur within the company’s private network or the internet.

    Exit mobile version